咨询与建议

限定检索结果

文献类型

  • 714 篇 期刊文献
  • 271 篇 会议
  • 5 册 图书

馆藏范围

  • 990 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 612 篇 工学
    • 314 篇 计算机科学与技术...
    • 247 篇 软件工程
    • 103 篇 电子科学与技术(可...
    • 99 篇 信息与通信工程
    • 96 篇 电气工程
    • 69 篇 控制科学与工程
    • 53 篇 光学工程
    • 52 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
    • 39 篇 生物工程
    • 36 篇 仪器科学与技术
    • 35 篇 生物医学工程(可授...
    • 34 篇 力学(可授工学、理...
    • 33 篇 动力工程及工程热...
    • 28 篇 机械工程
    • 17 篇 冶金工程
  • 561 篇 理学
    • 261 篇 物理学
    • 240 篇 数学
    • 82 篇 统计学(可授理学、...
    • 61 篇 生物学
    • 58 篇 化学
    • 53 篇 系统科学
    • 30 篇 地球物理学
  • 97 篇 管理学
    • 63 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 37 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 19 篇 法学
    • 16 篇 社会学
  • 15 篇 经济学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 20 篇 hadrons
  • 17 篇 deep learning
  • 10 篇 computational mo...
  • 9 篇 machine learning
  • 9 篇 stochastic syste...
  • 8 篇 predictive model...
  • 8 篇 photonics
  • 8 篇 cryptography
  • 7 篇 supersymmetry
  • 7 篇 artificial intel...
  • 6 篇 complex networks
  • 6 篇 bandwidth
  • 6 篇 hadron colliders
  • 6 篇 accuracy
  • 6 篇 forecasting
  • 6 篇 image reconstruc...
  • 6 篇 energy efficienc...
  • 5 篇 light-matter int...
  • 5 篇 support vector m...
  • 5 篇 plasmonics

机构

  • 92 篇 department of ph...
  • 92 篇 university of ch...
  • 91 篇 infn sezione di ...
  • 89 篇 iccub universita...
  • 86 篇 horia hulubei na...
  • 86 篇 infn sezione di ...
  • 86 篇 van swinderen in...
  • 84 篇 h.h. wills physi...
  • 84 篇 yandex school of...
  • 83 篇 cavendish labora...
  • 82 篇 school of physic...
  • 82 篇 infn sezione di ...
  • 81 篇 infn sezione di ...
  • 80 篇 university of mi...
  • 80 篇 department of ph...
  • 79 篇 massachusetts in...
  • 79 篇 national researc...
  • 79 篇 national researc...
  • 79 篇 imperial college...
  • 79 篇 stfc rutherford ...

作者

  • 78 篇 beiter a.
  • 78 篇 arzymatov k.
  • 78 篇 barter w.
  • 78 篇 brundu d.
  • 78 篇 bellee v.
  • 78 篇 baker s.
  • 78 篇 bobulska d.
  • 76 篇 bowcock t.j.v.
  • 76 篇 casse g.
  • 76 篇 blake t.
  • 76 篇 borsato m.
  • 76 篇 betancourt c.
  • 76 篇 belin s.
  • 75 篇 bediaga i.
  • 75 篇 amato s.
  • 75 篇 baryshnikov f.
  • 75 篇 bjørn m.
  • 75 篇 boettcher t.
  • 75 篇 atzeni m.
  • 75 篇 braun s.

语言

  • 923 篇 英文
  • 52 篇 其他
  • 15 篇 中文
检索条件"机构=Laboratory of Mathematical Engineering and Computer Science"
990 条 记 录,以下是31-40 订阅
排序:
Evolutionary Explainable Rule Extraction from (Modal) Random Forests  26
Evolutionary Explainable Rule Extraction from (Modal) Random...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Ghiotti, Michele Manzella, Federico Pagliarini, Giovanni Sciavicco, Guido Stan, Ionel Eduard Aclai Laboratory Department of Mathematics and Computer Science University of Ferrara Italy Department of Mathematical Physical and Computer Sciences University of Parma Italy Dbs Group Faculty of Engineering Free University of Bozen-Bolzano Italy
Symbolic learning is the subfield of machine learning concerned with learning predictive models with knowledge represented in logical form, such as decision tree and decision list models. Ensemble learning methods, su... 详细信息
来源: 评论
Spatial-Temporal Graph-Based AU Relationship Learning for Facial Action Unit Detection
Spatial-Temporal Graph-Based AU Relationship Learning for Fa...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Wang, Zihan Song, Siyang Luo, Cheng Zhou, Yuzhi Wu, Shiling Xie, Weicheng Shen, Linlin Shenzhen University Computer Vision Institute School of Computer Science & Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China University of Leicester School of Computing and Mathematical Sciences United Kingdom
This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial rep... 详细信息
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization  24
Coarse-to-Fine Proposal Refinement Framework for Audio Tempo...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Shenzhen China
Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. However, existing countermea... 详细信息
来源: 评论
An implementation, evaluation and validation of a dynamic fire and conflagration risk indicator for wooden homes  15
An implementation, evaluation and validation of a dynamic fi...
收藏 引用
15th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2024 / The 7th International Conference on Emerging Data and Industry 4.0, EDI40 2024
作者: Strand, R.D. Kristensen, L.M. Department of Safety Chemistry and Biomedical Laboratory Sciences Western Norway University of Applied Sciences Haugesund Norway Department of Computer Science Electrical Engineering and Mathematical Sciences Western Norway University of Applied Sciences Bergen Norway
The pervasive presence of IoT sensing devices combined with advances in cloud-based services has made historical- and forecast weather data services widely available for use in smart software systems. The contribution... 详细信息
来源: 评论
A Survey on Event Tracking in Social Media Data Streams
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 217-243页
作者: Zixuan Han Leilei Shi Lu Liu Liang Jiang Jiawei Fang Fanyuan Lin Jinjuan Zhang John Panneerselvam Nick Antonopoulos School of Computer Science and Communication Engineering and Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu UniversityZhenjiang 212013China School of Computing and Mathematical Sciences University of LeicesterLeicesterLE17RHUK Ocean College Jiangsu University of Science and TechnologyZhenjiang 212100China University Executive Office Edinburgh Napier UniversityEdinburghEH114BNUK
Social networks are inevitable parts of our daily life,where an unprecedented amount of complex data corresponding to a diverse range of applications are *** such,it is imperative to conduct research on social events ... 详细信息
来源: 评论
High-Performance SVD Partial Spectrum Computation  23
High-Performance SVD Partial Spectrum Computation
收藏 引用
2023 International Conference for High Performance Computing, Networking, Storage and Analysis, SC 2023
作者: Keyes, David Ltaief, Hatem Nakatsukasa, Yuji Sukkari, Dalal Computer Electrical and Mathematical Sciences & Engineering Division King Abdullah University of Science & Technology Thuwal Saudi Arabia Mathematical Institute University of Oxford Oxford United Kingdom Innovative Computing Laboratory University of Tennessee Knoxville United States
We introduce a new singular value decomposition (SVD) solver based on the QR-based Dynamically Weighted Halley (QDWH) algorithm for computing the partial spectrum SVD (QDWHpartial-SVD) problems. By optimizing the rati... 详细信息
来源: 评论
Supercomputer Based Parallel DGTD Algorithm with LTS Scheme for Electrical Large Problems
Supercomputer Based Parallel DGTD Algorithm with LTS Scheme ...
收藏 引用
2023 International Applied Computational Electromagnetics Society Symposium, ACES-China 2023
作者: Liu, Wenhao Chen, Liang Li, Ping State Key Laboratory of Radio Frequency Heterogeneous Integration Shanghai Jiao Tong University Shanghai China University of Science and Technology Computer Electrical and Mathematical Science and Engineering Division King Abdullah Thuwal Saudi Arabia
In this paper, a nodal discontinuous Galerkin time-domain (NDGTD) algorithm with parallel scheme is proposed to solve transient Maxwell's equations. With the aim to analyze the electromagnetic (EM) features of ele... 详细信息
来源: 评论
Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3247-3267页
作者: Xinghai Ju Jicang Lu Xiangyang Luo Gang Zhou Shiyu Wang Shunhang Li Yang Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Computing and Information Systems Singapore Management University188065Singapore College of Computer Science and Big Data Fuzhou UniversityFuzhou350116China
For Internet forum Points of Interest(PoI),existing analysis methods are usually lack of usability analysis under different conditions and ignore the long-term variation,which lead to blindness in method *** address t... 详细信息
来源: 评论
Boosting Performance and QoS for Concurrent GPU B+trees by Combining-Based Synchronization  23
Boosting Performance and QoS for Concurrent GPU B+trees by C...
收藏 引用
28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2023
作者: Zhang, Weihua Zhao, Chuanlei Peng, Lu Lin, Yuzhe Zhang, Fengzhe Lu, Yunping School of Computer Science Fudan University China Institute of Big Data Fudan University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Parallel Processing Institute Fudan University China Department of Computer Science Tulane University United States
Concurrent B+trees have been widely used in many systems. With the scale of data requests increasing exponentially, the systems are facing tremendous performance pressure. GPU has shown its potential to accelerate con... 详细信息
来源: 评论
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system
A malware detection method using satisfiability modulo theor...
收藏 引用
作者: Xie, Yaobin Chang, Rui Jiang, Liehui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Nowadays programmable logic controllers (PLCs) are suffering increasing cyberattacks. Attackers could reprogram PLCs to inject malware that would cause physical damages and economic losses. These PLC malwares are high... 详细信息
来源: 评论